{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:24:21Z","timestamp":1774365861439,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662533567","type":"print"},{"value":"9783662533574","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53357-4_5","type":"book-chapter","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T13:22:01Z","timestamp":1472563321000},"page":"61-78","source":"Crossref","is-referenced-by-count":51,"title":["Proofs of Proofs of Work with Sublinear Complexity"],"prefix":"10.1007","author":[{"given":"Aggelos","family":"Kiayias","sequence":"first","affiliation":[]},{"given":"Nikolaos","family":"Lamprou","sequence":"additional","affiliation":[]},{"given":"Aikaterini-Panagiota","family":"Stouka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,31]]},"reference":[{"key":"5_CR1","unstructured":"Back, A.: Hashcash (1997). http:\/\/www.cypherspace.org\/hashcash"},{"key":"5_CR2","unstructured":"Back, A., Corallo, M., Dashjr, L., Friedenbach, M., Maxwell, G., Miller, A., Poelstra, A., Timn, J., Wuille, P.: Enabling Blockchain Innovations with Pegged Sidechains (2014). https:\/\/blockstream.com\/sidechains.pdf"},{"key":"5_CR3","unstructured":"Bahack, L.: Theoretical bitcoin attacks with less than half of the computational power (draft). Cryptology ePrint Archive, Report 2013\/868 (2013). http:\/\/eprint.iacr.org\/"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/3-540-48071-4_10","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C Dwork","year":"1993","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139\u2013147. Springer, Heidelberg (1993)"},{"key":"5_CR5","unstructured":"Friedenbach, M.: Compact SPV proofs via block header commitments, Bitcoin-development mailing list post (2014). https:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2014-March\/004727.html"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The Bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281\u2013310. Springer, Heidelberg (2015)"},{"key":"5_CR7","unstructured":"Juels, A., Brainard, J.G.: Client puzzles: a cryptographic countermeasure against connection depletion attacks. In: NDSS. The Internet Society (1999)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/978-3-662-47854-7_33","volume-title":"Financial Cryptography and Data Security","author":"Y Lewenberg","year":"2015","unstructured":"Lewenberg, Y., Sompolinsky, Y., Zohar, A.: Inclusive block chain protocols. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 528\u2013547. Springer, Heidelberg (2015)"},{"key":"5_CR9","unstructured":"Miller, A.: The high-value-hash highway, Bitcoin forum post (2012). https:\/\/bitcointalk.org\/index.php?topic=98986.0"},{"key":"5_CR10","unstructured":"Nakamoto, S.: Bitcoin: a peer to peer electronic cash system (2008). http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"5_CR11","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Technical report, Cambridge, MA, USA (1996)"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/978-3-662-47854-7_32","volume-title":"Financial Cryptography and Data Security","author":"Y Sompolinsky","year":"2015","unstructured":"Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in bitcoin. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 507\u2013527. Springer, Heidelberg (2015)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53357-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:38:42Z","timestamp":1498340322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53357-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662533567","9783662533574"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53357-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}